HomeSort by relevance Sort by last modified time
    Searched defs:salt (Results 1 - 25 of 93) sorted by null

1 2 3 4

  /frameworks/base/tools/obbtool/
pbkdf2gen.cpp 29 * Will print out the salt and key in hex.
50 unsigned char salt[SALT_LEN]; local
52 if (read(fd, &salt, SALT_LEN) != SALT_LEN) {
53 fprintf(stderr, "Could not read salt from /dev/urandom: %s\n", strerror(errno));
61 if (PKCS5_PBKDF2_HMAC_SHA1(argv[1], strlen(argv[1]), salt, SALT_LEN,
67 printf("salt=");
69 printf("%02x", salt[i]);
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
p12_crpt.c 74 unsigned char *salt; local
93 salt = pbe->salt->data;
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
p12_mutl.c 72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
82 salt = p12->mac->salt->data;
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen)))
    [all...]
  /external/openssl/crypto/pkcs12/
p12_crpt.c 74 unsigned char *salt; local
93 salt = pbe->salt->data;
94 saltlen = pbe->salt->length;
95 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_KEY_ID,
101 if (!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_IV_ID,
p12_mutl.c 72 unsigned char key[EVP_MAX_MD_SIZE], *salt; local
82 salt = p12->mac->salt->data;
83 saltlen = p12->mac->salt->length;
94 if(!PKCS12_key_gen (pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter,
133 unsigned char *salt, int saltlen, int iter, const EVP_MD *md_type)
139 if (PKCS12_setup_mac (p12, iter, salt, saltlen, md_type) ==
156 int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen,
171 p12->mac->salt->length = saltlen;
172 if (!(p12->mac->salt->data = OPENSSL_malloc (saltlen)))
    [all...]
  /libcore/luni/src/main/java/javax/crypto/spec/
PBEParameterSpec.java 32 private final byte[] salt; field in class:PBEParameterSpec
36 * Creates a new <code>PBEParameterSpec</code> with the specified salt and
39 * @param salt
40 * the salt.
44 * if salt is null.
46 public PBEParameterSpec(byte[] salt, int iterationCount) {
47 if (salt == null) {
48 throw new NullPointerException("salt == null");
50 this.salt = new byte[salt.length]
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
PBEParameter.java 18 ASN1OctetString salt; field in class:PBEParameter
21 byte[] salt,
24 if (salt.length != 8)
26 throw new IllegalArgumentException("salt length must be 8");
28 this.salt = new DEROctetString(salt);
35 salt = (ASN1OctetString)seq.getObjectAt(0);
61 return salt.getOctets();
68 v.add(salt);
MacData.java 21 byte[] salt; field in class:MacData
44 this.salt = ((ASN1OctetString)seq.getObjectAt(1)).getOctets();
58 byte[] salt,
62 this.salt = salt;
73 return salt;
97 v.add(new DEROctetString(salt));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
PBEParametersGenerator.java 11 protected byte[] salt; field in class:PBEParametersGenerator
25 * @param salt the salt to be mixed with the password.
31 byte[] salt,
35 this.salt = salt;
50 * return the salt byte array.
52 * @return the salt byte array.
56 return salt;
  /external/chromium/crypto/
symmetric_key_unittest.cc 71 const char* salt; member in struct:PBKDF2TestVector
84 // The OS X crypto libraries have minimum salt and iteration requirements
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) {
95 test_data.password, test_data.salt,
113 "salt",
121 "salt",
129 "salt",
139 "salt",
  /external/chromium_org/crypto/
symmetric_key_unittest.cc 71 const char* salt; member in struct:PBKDF2TestVector
84 // The OS X crypto libraries have minimum salt and iteration requirements
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) {
95 test_data.password, test_data.salt,
113 "salt",
121 "salt",
129 "salt",
139 "salt",
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p5_crpt.c 82 unsigned char *salt; local
103 salt = pbe->salt->data;
104 saltlen = pbe->salt->length;
113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_pss_decode.c 26 @param saltlen The length of the salt used (octets)
37 unsigned char *DB, *mask, *salt, *hash; local
62 /* allocate ram for DB/mask/salt/hash of size modulus_len */
65 salt = XMALLOC(modulus_len);
67 if (DB == NULL || mask == NULL || salt == NULL || hash == NULL) {
74 if (salt != NULL) {
75 XFREE(salt);
117 /* DB = PS || 0x01 || salt, PS == modulus_len - saltlen - hLen - 2 zero bytes */
133 /* M = (eight) 0x00 || msghash || salt, mask = H(M) */
161 zeromem(salt, modulus_len);
    [all...]
pkcs_1_pss_encode.c 24 @param saltlen The length of the salt desired (octets)
39 unsigned char *DB, *mask, *salt, *hash; local
64 /* allocate ram for DB/mask/salt/hash of size modulus_len */
67 salt = XMALLOC(modulus_len);
69 if (DB == NULL || mask == NULL || salt == NULL || hash == NULL) {
76 if (salt != NULL) {
77 XFREE(salt);
86 /* generate random salt */
88 if (prng_descriptor[prng_idx].read(salt, saltlen, prng) != saltlen) {
94 /* M = (eight) 0x00 || msghash || salt, hash = H(M) *
    [all...]
  /external/openssh/openbsd-compat/
port-uw.c 56 char *salt; local
66 /* Encrypt the candidate password using the proper salt. */
67 salt = (pw_password[0] && pw_password[1]) ? pw_password : "xx";
75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0)
76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0));
80 result = (strcmp(xcrypt(password, salt), pw_password) == 0);
  /external/openssl/crypto/evp/
p5_crpt.c 82 unsigned char *salt; local
103 salt = pbe->salt->data;
104 saltlen = pbe->salt->length;
113 if (!EVP_DigestUpdate(&ctx, salt, saltlen))
  /external/scrypt/tests/
scrypt_test.cpp 33 const char *pw, *salt; member in struct:android::scrypt_test_setting_t
70 crypto_scrypt((const uint8_t*) s.pw, strlen(s.pw), (const uint8_t*) s.salt,
71 strlen(s.salt), s.Nfactor, s.rfactor, s.pfactor, output, sizeof(output)))
  /external/chromium/chrome/common/
visitedlink_common.h 15 // number of bytes in the salt
42 // a salt value for the links on one computer so that an attacker can not
90 uint8 salt[LINK_SALT_LENGTH]; member in struct:VisitedLinkCommon::SharedHeader
104 // pass the salt as a parameter. See the non-static version above if you
105 // want to use the current class' salt.
108 const uint8 salt[LINK_SALT_LENGTH]);
128 // salt used for each URL when computing the fingerprint
  /external/chromium_org/components/visitedlink/common/
visitedlink_common.h 16 // number of bytes in the salt
43 // a salt value for the links on one computer so that an attacker can not
91 uint8 salt[LINK_SALT_LENGTH]; member in struct:visitedlink::VisitedLinkCommon::SharedHeader
105 // pass the salt as a parameter. See the non-static version above if you
106 // want to use the current class' salt.
109 const uint8 salt[LINK_SALT_LENGTH]);
129 // salt used for each URL when computing the fingerprint
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_pss.c 101 * -2 salt length is autorecovered from signature
201 unsigned char *H, *salt = NULL, *p; local
213 * -2 salt length is maximized
242 salt = OPENSSL_malloc(sLen);
243 if (!salt)
248 if (RAND_bytes(salt, sLen) <= 0)
258 if (sLen && !EVP_DigestUpdate(&ctx, salt, sLen))
279 *p++ ^= salt[i];
291 if (salt)
292 OPENSSL_free(salt);
    [all...]
  /external/openssl/crypto/rsa/
rsa_pss.c 101 * -2 salt length is autorecovered from signature
201 unsigned char *H, *salt = NULL, *p; local
213 * -2 salt length is maximized
242 salt = OPENSSL_malloc(sLen);
243 if (!salt)
248 if (RAND_bytes(salt, sLen) <= 0)
258 if (sLen && !EVP_DigestUpdate(&ctx, salt, sLen))
279 *p++ ^= salt[i];
291 if (salt)
292 OPENSSL_free(salt);
    [all...]
  /external/srtp/test/
dtls_srtp_driver.c 126 uint8_t salt[SRTP_MAX_KEY_LEN]; local
176 memset(salt, 0xee, salt_len);
177 append_salt_to_key(key, key_len, salt, salt_len);
  /frameworks/base/core/java/android/content/res/
ObbInfo.java 52 * The salt for the encryption algorithm.
56 public byte[] salt; field in class:ObbInfo
85 dest.writeByteArray(salt);
104 salt = source.createByteArray();
  /frameworks/base/core/jni/
android_content_res_ObbScanner.cpp 36 jfieldID salt; member in struct:android::__anon31841
66 const unsigned char* salt = obb->getSalt(&saltLen); local
69 env->SetByteArrayRegion(saltArray, 0, saltLen, (jbyte*)salt);
70 env->SetObjectField(obbInfo, gObbInfoClassInfo.salt, saltArray);
102 GET_FIELD_ID(gObbInfoClassInfo.salt, clazz,
103 "salt", "[B");
  /frameworks/base/libs/androidfw/tests/
ObbFile_test.cpp 70 unsigned char salt[SALT_SIZE] = {0x01, 0x10, 0x55, 0xAA, 0xFF, 0x00, 0x5A, 0xA5}; local
71 EXPECT_TRUE(mObbFile->setSalt(salt, SALT_SIZE))
72 << "Salt should be successfully set";
91 EXPECT_EQ(sizeof(salt), saltLen)
92 << "salt sizes were not the same";
94 for (int i = 0; i < sizeof(salt); i++) {
95 EXPECT_EQ(salt[i], newSalt[i])
96 << "salt character " << i << " should be equal";
98 EXPECT_TRUE(memcmp(newSalt, salt, sizeof(salt)) == 0
    [all...]

Completed in 549 milliseconds

1 2 3 4